共 50 条
- [1] A Design Pattern for Event-Based Processing of Security-enriched SOAP Messages [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 410 - 415
- [2] Assessment of Network Security Policy Based on Security Capability [J]. 2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1204 - 1208
- [3] Intelligent Security Cycle: A Rule Based Run Time Malicious Code Detection Technique for SOAP Messages [J]. PROCEEDINGS OF THE 2016 19TH INTERNATIONAL MULTI-TOPIC CONFERENCE (INMIC), 2016, : 36 - 45
- [4] Security Protection using Simple Object Access Protocol (SOAP) Messages Techniques [J]. ICED: 2008 INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN, VOLS 1 AND 2, 2008, : 437 - 442
- [5] Limitations of Web Service Security on SOAP Messages in a Document Production Workflow Environment [J]. ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 342 - +
- [6] Design of network security policy information model for policy-based network management [J]. 7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 701 - 705
- [7] Network security project management: A security policy-based approach [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
- [8] An Automata-based Security Policy Translation for Network Security Functions [J]. 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 268 - 272
- [9] Design of a LDAP schema based on network security policy information model for storing security policy [J]. SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 373 - 377
- [10] From security policy to practice: Sending the right messages [J]. Computer Fraud and Security, 2010, 2010 (03): : 13 - 19